Academic Journal of Interdisciplinary Studies MCSER Publishing, Rome-Italy E-ISSN 2281-4612 ISSN 2281-3993 Vol 5 No 1 March 2016 The Regulation of Cyber Crime in Albania in the Framework of Harmonization of Internal Legislation with the European Legislation Aldo Shkembi, PhD Lecturer of “European University of Tirana”; Email: aldo-sh86@hotmail.com Indrit Shtupi, PhD Lecturer of “Windom University”; Email: indritshtupi@yahoo.com Arjan Qafa, PhD Inspector of "Supreme Council of Justice"; E-mail, arjan.qafa@hotmail.com Doi:10.5901/ajis.2016.v5n1p127 Abstract The big social dangerousness of cybercrime and the increase of computer misuse, demand that his problem has to be addressed on certain law provisions. So, new interventions in penal codes are needed, interventions that will deal with this activity. In order to prohibit computer crime, many states are trying to find more efficient tools, methods and acts in this direction. Firstly, it is the juridical-penal regulation that has to be done, seeing the problem as a juridical protection fro the unauthorized interventions in computer systems. There has been discussion among low-making structures, with the approval of laws that has to do with the incrimination of the act of illegal intervention, concerning the moment when that intervention starts to be considered as a penal act. So, different states, see it as a penal act from the moment of the very first unauthorized intervention and some others from the moment that the smallest damage is caused. The aim of this paper is to make an overview of the regulation of cyber crime in Albania in the framework of harmonization of internal legislation with the european legislation. In recent years, Albania has worked for the establishment and implementation of international standards in the fight against organized crime, money laundry and corruption. Enough laws function in the national legislation such as: the law for electronic assignment, classified state information, protection of personal data, electronic communication, communication interception, for books, mail service etc. Keywords: Cybercrime, Covention, Harmonization, Computer system, Computer fraud, Computer falsification. 1. Introduction Related to the Albanian legislation on cyber crime in the range of the harmoization with the legale European Framework on Cyber crime, it is important to mention that there are also politics and documents and strategies confirmed, that help in the fight against cybercrime, from which the mos important are: The Sectorial Strategy of Society of Information; The Document of politics for electronic communication in the Republic of Albania; the Document of politics for development of telecommunication in the Republic of Albania; The decisions of the Council of Ministers for ratification of documents of politics and strategies etc. Some of the laws that help in the security of systems in society of information, are presented as below: - Nr. 9880 law, date 25.02.2008 “On electronic signature” - Nr. 9880 law, date 10.03.2008 “On protection of personal data” - Nr. 9643 law, date 20.11.2006, changed “On public procurements”, that makes possible the possibility of electronic procurement - Nr. 9723 law, date 3.05.2007 “On the National Center of Registration” - Nr. 9918 law, date 19.05.2008 “On electronic communication in the Republic of Albania” 2. The Albanian Legislation on Cyber Crime: The Ratification of Budapest Convention Until the penal legislative changes of 2008, there weren’t laws on penal acts in the computer field in Albania, although 127 E-ISSN 2281-4612 ISSN 2281-3993 Academic Journal of Interdisciplinary Studies MCSER Publishing, Rome-Italy Vol 5 No 1 March 2016 computer systems were already part of the Albanian society. Here, we include the harmonization of the national legislation with the international one, for the fight against cybercrime. Another reason that campaigned the inclusion of new juridical-penal norms, was related to the will of the legislator sto approach the Albanian legislation with the legislation of the European Union. Related to that, the Republic of Albania with the nr. 8888 law, date 25.04.2002 (published in the official notebook nr. 18, p. 18)1 has ratified the convention for cybercrime, while in 2004 it also ratified the additional protocol of this convention. In this direction, we may say that provisions included in the Albanian Penal Code, in the fight against cybercrime are in a full coherence with the Convention of the Council of Europe “On cyber crime” 3. Cyber Crime as a Penal Act in the Internal Legislation of the State To reflect the commitment of Albania, in the framework of the Convention on Cybercrime, the Ministry of Justice took the initiative to make the adequate provisions and add them in the Penal Code of the Republic of Albania and in the Code of Penal Procedure. These initiatives came to an end with the approval of the nr.10023 law, date 27.11.20082, and nr. 10054 law, date 29.12.2008. Cyber penal acts includes penal acts committed against or through systems and computer programs that contain computer data. Nr. 10023 law/20083 adds as penal acts those behaviours (defined as such from the Protocol of the Convention on Cybercrime), that refer to computer deliverance of materials that has to do with genocide, crimes against humanity, racism or xenophobia. The normative solution that the Albanian legislators have given in this direction, was the one of including new provisions in the text of Penal Code, related to penal acts in computer field. In this law there are provisions that make sanctions for illegal acts performed through computer, electronic devices, electronic networks etc, where the most widespread ones will be illustrated with examples from the court practices. In the part of the work that follows, is presented an authentic juridical- penal analyze of circumstances of implementation of penal responsibility according to provisions we are talking about. This explanation aims to make clear the risk that every individual, private business, or governmental agency has to take into consideration from the moment that it decides to use the services of an interconnected computer network in continuity. 3.1 Sharing materials in favor of genocide or crimes against humanity through computer Nr. 10023/2008 law adds in addition as penal acts those behaviors (defined as such from the Protocol of the Convention for Cybercrime) that refer to the computer deliverance of materials that have to do with genocide, crimes against humanity, racism and xenophobia, Concretely, it is written in the proper part of Penal Code, article 74/a “computer deliverance of material pro-genocide or crimes against humanity”4. This act aim to punish the protectors of people and historic events that has to do with crimes against humanity, ignoring the sacrifice, the suffering and the memory of people that were objects of international crime. This prevision aims to protect the life and the health of persons who belong to an ethnicity, nation, race or certain religion, this is in accordance with the constitutional provisions and also with the international instruments of basic human right and freedoms. Because of the object that it aims to protect, this provision is positioned in the Second Chapter of the Penal Code “Penal acts against life. Crimes against life”, in the session “Crimes against life committed deliberately”. And more concretely, objects of crimes are juridical relations established to protect life and the health of the person who belongs to an ethnicity, nation, race or certain religion. Law nr. 8888, date 25.04.2002 (published in the official notebook nr. 18, p. 18). Law nr. 10023, datë 27.11.2008 for some changes in law nr. 7895 date 27.01.1995 “ Penal Code of Republice of Albania ”. 3 Law nr. 10023 date 27.11.2008 (pg 190, ufficial jurnal nr. 9395, 2008). 4 Article 74/a of Penal Code of Republic of Albania. 1 2 128 E-ISSN 2281-4612 ISSN 2281-3993 3.2 Academic Journal of Interdisciplinary Studies MCSER Publishing, Rome-Italy Vol 5 No 1 March 2016 In addition, nr. 10023/2008 law defines as penal acts “Sharing racist or xenophobic materials through computer system and insulting for racist or xenofobic motives through computers (article 119/b) The goal of this provisions is the protection of dignity and personality of persons who belong to an ethnicity, nation, race or certain religion. For this reason they are positioned in the Second Chapter of the Special Part of Penal Code “Penal acts against life. Crimes against life”, section VIII “Penal acts against moral and dignity”5. In this two penal acts three concepts “computer system” or “racist motives or xenophobie” are found, these are circumstances that specify this two penal acts in two directions: A) in the direction of the tool that the penal act is performed with and B) in the direction of the “racist or xenophobic motive”, as a subjective part. The two acts, for the low risk that they present, are considered criminal offence, having for the two of them as sanction, fines or imprisonment up to two years. As for the insult for racist or xenofobic motives through computers, we have to emphasize that with the nr. 10054 law, date 29.12.2008, “For things and changes in the Code of Penal Procedure”6, it is said in the 59 article of the Code of Penal Procedure, to also among penal acts that are to investigate, if the person demaged asks such a thing, to be also insult for racist motives or xenophobie (article 119/b). 3.3 Computer fraud Another penal act is the one of 143/b article of Penal Code “computer fraud”. This provision aims to protect the wealth of people from computer interventions, that is done to their systems. The aim of this provision is the criminalization of every manipulation in processing data, aiming an illegal transfer of wealth and causing a reduce of the wealth of the other person. Computer manipulations are considered penal acts, if as a result of that possessor of the wealth, have now a reduced wealth and if the perpetuator of the criminal act acts in this was with his fre will. The terms “economical benefit” or “reduce of wealth” are too wide and include from money to the rights for credits, treasury bonds etc 3.4 Computer falsification A computer penal act added with nr. 10023/2008 law is also “computer falsification” (article 186/a)7. This provision aims to protect the authenticity of computer data from access, change, erase, or removal in an unfair way, in order to present and use them as authentic. This kind of falsification is specified from an objective side, because of the special way it is done. Specific for this penal act is that the acts of accessing, changing, removing or erasing computer data, has to be done unfairly. This reflects the idea that such a behavior is not always punishable, but can be legal or justified as a case of exercising a right. 3.5 Unauthorized access on computer The penal act “Unauthorized access on computer” is written on article 192/b of Penal Code, that is a crime because of the relations that it violates, the forms it is practiced, and consequences that it causes8. This provision aims to protect the content of computer data from unauthorized access. Unauthorized access that can be emerged even in the form of overcoming competence to have access in a computer system, is a penal act that is just consumed by doing the action of accessing the system and seeing data that the system contains, without excluding the possibility that the perpetuator of the act can be responsible even for other acts, as the provisions of following articles show... The unauthorized computer access covers the basic violation of threat against security (confidentiality, integrity, and availability of computer system and data. Article 119/ of Penal Code of Republic of Albania. Law nr. 10054, date 29.12.2008, “For things and changes in the Code of Penal Procedure” 7 Article 186/a of Penal Code of Republic of Albania. 8 Article 192/b of Penal Code of Republic of Albania. 5 6 129 E-ISSN 2281-4612 ISSN 2281-3993 3.6 Academic Journal of Interdisciplinary Studies MCSER Publishing, Rome-Italy Vol 5 No 1 March 2016 Illegal eaves dropping of computer data It is added in the Penal Code, article 293/a as penal act the process of “illegal eavesdropping”9, that aims the protection of computer data from or inside of a computer system from illegal eavesdropping. This act, because of the big social risk, is considered as crime, having a sentence from 3 to 7 years imprisonment. This penal norm takes under protection the right of privacy in transmission / communication of data. It violates the privacy of communication in the same way as traditional eavesdropping and the registration of telephone conversations among people. Eavesdropping may also contain the registration of data. Technic tools may contain technical tools on transmission lines, also tools to gathe and register wireless communications. They may contain software use, passwords and codes. 3.7 Intervention on computer data, intervention on computer systems. After 293/a article, another article, 293/b is added, it expresses as penal act the unauthorized interventions on computer data10. The legal interest that is supposed to be protected by that, is integrity and proper functioning, or the use of saved computer data or computer programs. The “”damages” or “deformations” are acts that cause a negative change of integrity or information of data or programs. The erase of data destroys them, and makes them unknown. While “suprimation” means every action that prevents or ends the availability of the data of the person, who can access the computer. These acts are penally punishable, if they are performed in an unauthorized way, that means that the person who has done the action didn’t have the right for such a thing. This means that the testing or protecting a computer system that is authorized from the owner or its user, is the exercise of a right, and is not considered as penal act. After 293/b article, another article293/c is added, it considers as penal act the intervention on computer systems, through the creation of serious and unauthorized obstacles that violate the normal functioning of the computer system11. The term “obstacle” refers to acts that affect in the normal functioning of the computer system. These obstacles can be crated through access, damage, deformation, change, erase or from the process of disestablishing computer data. After 293/c article, it is added another article, 293/ç that considers as penal act the misuse of devices or tools, according to the provision, the production, sale, giving for use, spreading or any other act for making a device available, if the device contains a computer program, a password, a code or some other similar data, that are created or adopted in order to access a computer system or a part of it, aiming to commit penal acts considered in 192/b, 293/a, 293/b, 293/c articles. 4. Conclusions The companies around the world are attracted from many benefits that come from information and communication technology and governments in developed countries are investing more in this field. It is necessary that these profits which pass to the government and its citizens, be protected from cyber attacks, because those are very important for country’s security. Cyberspace as a space without borders seek an international collaboration and coordination in order to guarantee cyber security. Furthermore with the membership in NATO and the progress made toward EU membership, Albania more and more is active part of many initatives and programs for cyber security and it must complete its commitments towards allies countries. Albania must develop policies,standards, instructions and procedures based on best standards and practices in order to guarantee cyber security, to offer protection from cyber threats and respecting in every moment the principles of fundamental rights e freedom and also other democratic principles. Strategies and programs must be adjusted to the needs and the availability of the country to implement them, without avoiding to reflect the future needs of the country. The best strategy for our country would be the construction of capacities for cyber security, in the period when it is required it is more necessary. Strategical objectives that must be followed in order to complete the above vision are: 1. The completion of legal framework in the field of cyber security 2. Raising awareness about cyber security 3. Increasing the level of knowledge, skills and capacities for expertise on the field of cyber security Article 293/a of Penal Code of Republic of Albania. Article 293/b of Penal Code of Republic of Albania. 11 Article, 293/c of Penal Code of Republic of Albania. 9 10 130 E-ISSN 2281-4612 ISSN 2281-3993 4. 5. 6. 7. Academic Journal of Interdisciplinary Studies MCSER Publishing, Rome-Italy Vol 5 No 1 March 2016 The establishment of specialized units Identification and protection of Critical Information Infrastructure (CIIP) Creation and implementation of basic requirements of cyber security Increasing investments for growing the security in state networks/systems. References Article 74/a of Penal Code of Republic of Albania. Article 119/ of Penal Code of Republic of Albania. Article 186/a of Penal Code of Republic of Albania. Article 192/b of Penal Code of Republic of Albania. Article 293/a of Penal Code of Republic of Albania. Article 293/b of Penal Code of Republic of Albania. Article, 293/c of Penal Code of Republic of Albania. Law nr. 8888, date 25.04.2002 (published in the official notebook nr. 18, p. 18). Law nr. 10023, datë 27.11.2008 for some changes in law nr. 7895 date 27.01.1995 “ Penal Code of Republice of Albania ”. (ufficial jurnal nr. 9395, 2008). Law nr. 10054, date 29.12.2008, “For things and changes in the Code of Penal Procedure” 131 E-ISSN 2281-4612 ISSN 2281-3993 Academic Journal of Interdisciplinary Studies MCSER Publishing, Rome-Italy 132 Vol 5 No 1 March 2016